#
Category: Threat Intelligence
See all categories.
Hello everyone, In my previous post, I explored the use of MCP servers and LLM for DFIR use cases and highlighted their benefits. In this blog, I am looking into a different perspective: the potential abuse of AI agents by threat actors and the impact they could have on an enterprise environment.
Hello Everyone, I have been seeing many posts regarding MCP servers on X (Twitter) lately, featuring numerous toolkits for coding, documentation, and more. This got me thinking about applying it to DFIR use cases, like Digital Forensics and Malware Analysis. While there are already many MCP servers available for DFIR, I wanted to build some on my own to better understand the architecture, as well as explore some readily available servers from reputable sources. So In this post, I will cover setting up a local LLM and building some simple MCP servers specifically for DFIR.
For Educational purpose only Spreading Malware is a violation of the law, so please don't create and send any malware using the tactics provided here to
For Educational purpose only. Spreading Malware is a violation of the law, so please don't create and send any malware using the tactics discussed here to